A Defense Method Against Persistent Fault Attack

Zhixiang Xu, Ning Wu, Fang Zhou, Fen Ge
{"title":"A Defense Method Against Persistent Fault Attack","authors":"Zhixiang Xu, Ning Wu, Fang Zhou, Fen Ge","doi":"10.1109/ICCT56141.2022.10072854","DOIUrl":null,"url":null,"abstract":"Persistent fault attack is a powerful attack technology to recover key information by using persistent fault and statistical methods. It can be applied to the key recovery realized by block cipher look-up table. Its biggest advantage is that the key information can be recovered only by one failure injection, and persistent fault attack can be applied to the classic block cipher protection implementation such as detection technology and mask technology. Nevertheless, the classic fault attack protection technology still improves the difficulty of persistent fault attack. The detection and infection technologies increase the number of ciphertext required to extract the correct key by a constant multiple, which will hinder the attack in the actual scene. Real time health detection of S-box is an effective means to prevent persistent fault attacks. Once the injected fault of S-box is detected, reset, restart or refuse to continue encryption. However, this defense strategy is not effective against multiple persistent fault attacks without changing the secret key. Persistent fault attack makes full use of the double mapping property of S-box, so health detection based on the double mapping property of S-box is an efficient protection method. Compared with the traditional detection method, the 255 times XOR method proposed in this paper has low cost and high efficiency, and the single byte modification of S-box after inspection can effectively mislead the encrypted data obtained by the attacker, even if this data is extremely useful to attackers. The research results of this paper show that the proposed defense scheme can effectively resist three secret key analysis strategies of persistent fault attack.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT56141.2022.10072854","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Persistent fault attack is a powerful attack technology to recover key information by using persistent fault and statistical methods. It can be applied to the key recovery realized by block cipher look-up table. Its biggest advantage is that the key information can be recovered only by one failure injection, and persistent fault attack can be applied to the classic block cipher protection implementation such as detection technology and mask technology. Nevertheless, the classic fault attack protection technology still improves the difficulty of persistent fault attack. The detection and infection technologies increase the number of ciphertext required to extract the correct key by a constant multiple, which will hinder the attack in the actual scene. Real time health detection of S-box is an effective means to prevent persistent fault attacks. Once the injected fault of S-box is detected, reset, restart or refuse to continue encryption. However, this defense strategy is not effective against multiple persistent fault attacks without changing the secret key. Persistent fault attack makes full use of the double mapping property of S-box, so health detection based on the double mapping property of S-box is an efficient protection method. Compared with the traditional detection method, the 255 times XOR method proposed in this paper has low cost and high efficiency, and the single byte modification of S-box after inspection can effectively mislead the encrypted data obtained by the attacker, even if this data is extremely useful to attackers. The research results of this paper show that the proposed defense scheme can effectively resist three secret key analysis strategies of persistent fault attack.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种针对持续故障攻击的防御方法
持续故障攻击是一种利用持续故障和统计方法恢复关键信息的强大攻击技术。该方法可应用于分组密码查找表实现的密钥恢复。其最大的优点是只需一次故障注入即可恢复密钥信息,并且可以将持续故障攻击应用于检测技术和掩码技术等经典分组密码保护实现中。尽管如此,经典的故障攻击防护技术仍然提高了持续故障攻击的难度。检测和感染技术将提取正确密钥所需的密文数量增加了一个常数倍,这将阻碍实际场景中的攻击。S-box实时健康检测是防止持续故障攻击的有效手段。一旦检测到S-box注入故障,复位、重启或拒绝继续加密。然而,这种防御策略在不更改密钥的情况下,对多个持久错误攻击无效。持续故障攻击充分利用了S-box的双映射特性,基于S-box双映射特性的健康检测是一种有效的防护方法。与传统的检测方法相比,本文提出的255倍异或方法成本低、效率高,且检测后对S-box进行单字节修改,可以有效误导攻击者获得的加密数据,即使这些数据对攻击者极为有用。研究结果表明,所提出的防御方案能够有效抵御三种持续故障攻击的密钥分析策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Anomaly Detection Method For Interactive Data of Third-Party Load Aggregation Platform Based on Multidimensional Feature Information Fusion Stable and Robust Improvement of AMP for Supporting Massive Connectivity Power Allocation and Beamforming Vectors Optimization in STAR-RIS Assisted SWIPT Joint Identification of Modulation and Channel Coding Based on Deep Learning Geometric Feature Detection of Space Targets Based on Color Space
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1